ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 100

Question list
Search
Search

List of questions

Search

DRAG DROP

During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant.

What is the best approach for the CISO?

Below are the common phases to creating a Business Continuity/Disaster Recovery (BC/DR) plan.

Drag the remaining BC\DR phases to the appropriate corresponding location.

Question 991
Correct answer: Question 991

DRAG DROP

Match the objectives to the assessment questions in the governance domain of Software Assurance Maturity Model (SAMM).

Question 992
Correct answer: Question 992

DRAG DROP

A software security engineer is developing a black box-based test plan that will measure the system's reaction to incorrect or illegal inputs or unexpected operational errors and situations. Match the functional testing techniques on the left with the correct input parameters on the right.

Question 993
Correct answer: Question 993

HOTSPOT

Which Web Services Security (WS-Security) specification maintains a single authenticated identity across multiple dissimilar environments? Click on the correct specification in the image below.

Question 994
Correct answer: Question 994

Explanation:

WS-Federation

Reference: Java Web Services: Up and Running" By Martin Kalin page 228

HOTSPOT

Which Web Services Security (WS-Security) specification handles the management of security tokens and the underlying policies for granting access? Click on the correct specification in the image below.

Question 995
Correct answer: Question 995

Management has decided that a core application will be used on personal cellular phones. As an implementation requirement, regularly scheduled analysis of the security posture needs to be conducted. Management has also directed that continuous monitoring be implemented. Which of the following is required to accomplish management's directive?

A.
Strict integration of application management, configuration management (CM), and phone management
A.
Strict integration of application management, configuration management (CM), and phone management
Answers
B.
Management application installed on user phones that tracks all application events and cellular traffic
B.
Management application installed on user phones that tracks all application events and cellular traffic
Answers
C.
Enterprise-level security information and event management (SIEM) dashboard that provides full visibility of cellular phone activity
C.
Enterprise-level security information and event management (SIEM) dashboard that provides full visibility of cellular phone activity
Answers
D.
Routine reports generated by the user's cellular phone provider that detail security events
D.
Routine reports generated by the user's cellular phone provider that detail security events
Answers
Suggested answer: B

What is the FIRST step prior to executing a test of an organisation's disaster recovery (DR) or business continuity plan (BCP)?

A.
identify key stakeholders,
A.
identify key stakeholders,
Answers
B.
Develop recommendations for disaster scenarios.
B.
Develop recommendations for disaster scenarios.
Answers
C.
Identify potential failure points.
C.
Identify potential failure points.
Answers
D.
Develop clear evaluation criteria.
D.
Develop clear evaluation criteria.
Answers
Suggested answer: D

Which of the following security tools will ensure authorized data is sent to the application when implementing a cloud based application?

A.
Host-based intrusion prevention system (HIPS)
A.
Host-based intrusion prevention system (HIPS)
Answers
B.
Access control list (ACL)
B.
Access control list (ACL)
Answers
C.
File integrity monitoring (FIM)
C.
File integrity monitoring (FIM)
Answers
D.
Data loss prevention (DLP)
D.
Data loss prevention (DLP)
Answers
Suggested answer: B

Before implementing an internet-facing router, a network administrator ensures that the equipment is baselined/hardened according to approved configurations and settings. This action provides protection against which of the following attacks?

A.
Blind spoofing
A.
Blind spoofing
Answers
B.
Media Access Control (MAC) flooding
B.
Media Access Control (MAC) flooding
Answers
C.
SQL injection (SQLI)
C.
SQL injection (SQLI)
Answers
D.
Ransomware
D.
Ransomware
Answers
Suggested answer: B

A cloud service provider requires its customer organizations to enable maximum audit logging for its data storage service and to retain the logs for the period of three months. The audit logging generates extremely high amount of logs.

What is the MOST appropriate strategy for the log retention?

A.
Keep last week's logs in an online storage and the rest in a near-line storage.
A.
Keep last week's logs in an online storage and the rest in a near-line storage.
Answers
B.
Keep all logs in an online storage.
B.
Keep all logs in an online storage.
Answers
C.
Keep all logs in an offline storage.
C.
Keep all logs in an offline storage.
Answers
D.
Keep last week's logs in an online storage and the rest in an offline storage.
D.
Keep last week's logs in an online storage and the rest in an offline storage.
Answers
Suggested answer: D
Total 1.482 questions
Go to page: of 149